Do you remember the name Mirai? Sure, you do. Back in 2016, Mirai became the first IoT botnet to make headlines by hitting global DNS provider Dyn and taking down almost half of the Internet. Now, Mirai is back with a new target. Last week, researchers from IBM X-Force found that variants of the infamous…

Con artists have been around since biblical times, but today they flourish. The Internet has provided the world with any-to-any communications and automation. In turn, these technologies have allowed the con-man to do with their illicit efforts what the Ford T did to the car industry – bring it to the masses. Phishing is the…

Anyone with millennial-aged children at home will find it hard to remember them without their faces glued to their mobile phones. It seems that their entire universe has been shrunk into a tiny metallic and glass panel, a bit like the Big Bang in reverse. For those young adults, whose birth years begin with the…

Big CSP Security as a Service Opportunity with 5G The migration of cellular telecommunications from 4G networks to 5G provides many opportunities for mobile operators. However, with high bandwidth, ultra-low latency, and dynamic network slicing capabilities, 5G is not just another bigger, better, faster network than 4G. It is a completely new concept in network…

Home Router…, Trojan Horse? The world of cybersecurity is full of stories of technology secretly encroaching on our privacy. The most common attack comes from malware that we enable hackers to store on our computers or mobile devices. Most of us are familiar with these “Trojan horse” viruses that can open up our devices to…

Fileless malware is a form of cyberattack where the malicious software that enters your computer system resides within volatile storage components such as RAM. It is distinguished from traditional memory-resident malware that generally required access to your hard disk before it hid itself away in memory. Due to its ability to camouflage itself solely in…

I’ve never really liked horror movies. They tend to give me the creeps. But I can’t help feeling that some of the scenes from those movie scripts are threatening to jump out of the screen and impact our everyday lives. It’s true that the Internet of Things (IoT) is making a huge impact on our…

The Internet of Things (IoT) is the interconnection of everyday computerized devices linked through the Internet that enables them to send and receive data. IoT means different things to different people, and in this post we walk you through various IoT perspectives. Brief History of the IoT Back in 1982, the Internet was still…

We all know what Phishing is—a target is contacted by email, telephone, or text message by someone posing as a legitimate institution or website to lure individuals into providing sensitive data such as banking or credit card credentials. The problem is that people have now become wiser and think twice before clicking. A group of…

On August 2nd, 2018, the US Federal Bureau of Investigation (FBI) issued the following Public Service Announcement: “Cyber Actors Use Internet of Things Devices as Proxies for Anonymity and Pursuit of Malicious Cyber Activities” This announcement was one in a series of FBI alerts issued over the past three years that focused on the potential…

Keeping you up to date

Be the first to know about the latest updates and trends in network security and IoT.